Switch global error menu icon to vectorized MD asset
[chromium-blink-merge.git] / chrome / browser / chromeos / login / existing_user_controller_browsertest.cc
blob5fbaa050a9a4aba97bd5cbce126e3b18ae921e6b
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file.
5 #include <string>
6 #include <vector>
8 #include "base/bind.h"
9 #include "base/bind_helpers.h"
10 #include "base/callback.h"
11 #include "base/command_line.h"
12 #include "base/location.h"
13 #include "base/memory/ref_counted.h"
14 #include "base/prefs/pref_service.h"
15 #include "base/prefs/scoped_user_pref_update.h"
16 #include "base/run_loop.h"
17 #include "chrome/browser/chrome_notification_types.h"
18 #include "chrome/browser/chromeos/login/existing_user_controller.h"
19 #include "chrome/browser/chromeos/login/help_app_launcher.h"
20 #include "chrome/browser/chromeos/login/helper.h"
21 #include "chrome/browser/chromeos/login/screens/mock_base_screen_delegate.h"
22 #include "chrome/browser/chromeos/login/session/user_session_manager.h"
23 #include "chrome/browser/chromeos/login/session/user_session_manager_test_api.h"
24 #include "chrome/browser/chromeos/login/supervised/supervised_user_creation_screen.h"
25 #include "chrome/browser/chromeos/login/ui/mock_login_display.h"
26 #include "chrome/browser/chromeos/login/ui/mock_login_display_host.h"
27 #include "chrome/browser/chromeos/login/wizard_controller.h"
28 #include "chrome/browser/chromeos/policy/browser_policy_connector_chromeos.h"
29 #include "chrome/browser/chromeos/policy/device_local_account.h"
30 #include "chrome/browser/chromeos/policy/device_local_account_policy_service.h"
31 #include "chrome/browser/chromeos/policy/device_policy_cros_browser_test.h"
32 #include "chrome/browser/chromeos/policy/proto/chrome_device_policy.pb.h"
33 #include "chrome/browser/chromeos/settings/cros_settings.h"
34 #include "chrome/browser/ui/webui/chromeos/login/supervised_user_creation_screen_handler.h"
35 #include "chrome/grit/generated_resources.h"
36 #include "chrome/test/base/testing_browser_process.h"
37 #include "chromeos/chromeos_switches.h"
38 #include "chromeos/dbus/fake_session_manager_client.h"
39 #include "chromeos/login/auth/key.h"
40 #include "chromeos/login/auth/mock_url_fetchers.h"
41 #include "chromeos/login/auth/user_context.h"
42 #include "chromeos/login/user_names.h"
43 #include "chromeos/settings/cros_settings_names.h"
44 #include "chromeos/settings/cros_settings_provider.h"
45 #include "components/policy/core/common/cloud/cloud_policy_constants.h"
46 #include "components/policy/core/common/cloud/cloud_policy_core.h"
47 #include "components/policy/core/common/cloud/cloud_policy_store.h"
48 #include "components/policy/core/common/cloud/mock_cloud_policy_store.h"
49 #include "components/policy/core/common/cloud/policy_builder.h"
50 #include "components/user_manager/user.h"
51 #include "components/user_manager/user_manager.h"
52 #include "components/user_manager/user_type.h"
53 #include "content/public/test/mock_notification_observer.h"
54 #include "content/public/test/test_utils.h"
55 #include "google_apis/gaia/mock_url_fetcher_factory.h"
56 #include "policy/proto/device_management_backend.pb.h"
57 #include "testing/gmock/include/gmock/gmock.h"
58 #include "testing/gtest/include/gtest/gtest.h"
60 using ::testing::AnyNumber;
61 using ::testing::Invoke;
62 using ::testing::InvokeWithoutArgs;
63 using ::testing::Return;
64 using ::testing::ReturnNull;
65 using ::testing::WithArg;
66 using ::testing::_;
68 namespace em = enterprise_management;
70 namespace chromeos {
72 namespace {
74 const char kGaiaID[] = "12345";
75 const char kUsername[] = "test_user@gmail.com";
76 const char kSupervisedUserID[] = "supervised_user@locally-managed.localhost";
77 const char kPassword[] = "test_password";
79 const char kPublicSessionAccountId[] = "public_session_user@localhost";
80 const int kAutoLoginNoDelay = 0;
81 const int kAutoLoginShortDelay = 1;
82 const int kAutoLoginLongDelay = 10000;
84 // Wait for cros settings to become permanently untrusted and run |callback|.
85 void WaitForPermanentlyUntrustedStatusAndRun(const base::Closure& callback) {
86 while (true) {
87 const CrosSettingsProvider::TrustedStatus status =
88 CrosSettings::Get()->PrepareTrustedValues(base::Bind(
89 &WaitForPermanentlyUntrustedStatusAndRun,
90 callback));
91 switch (status) {
92 case CrosSettingsProvider::PERMANENTLY_UNTRUSTED:
93 callback.Run();
94 return;
95 case CrosSettingsProvider::TEMPORARILY_UNTRUSTED:
96 return;
97 case CrosSettingsProvider::TRUSTED:
98 content::RunAllPendingInMessageLoop();
99 break;
104 } // namespace
106 class ExistingUserControllerTest : public policy::DevicePolicyCrosBrowserTest {
107 protected:
108 ExistingUserControllerTest() : mock_login_display_(NULL) {}
110 ExistingUserController* existing_user_controller() {
111 return ExistingUserController::current_controller();
114 const ExistingUserController* existing_user_controller() const {
115 return ExistingUserController::current_controller();
118 void SetUpInProcessBrowserTestFixture() override {
119 SetUpSessionManager();
121 DevicePolicyCrosBrowserTest::SetUpInProcessBrowserTestFixture();
123 mock_login_display_host_.reset(new MockLoginDisplayHost());
124 mock_login_display_ = new MockLoginDisplay();
125 SetUpLoginDisplay();
128 virtual void SetUpSessionManager() {
131 virtual void SetUpLoginDisplay() {
132 EXPECT_CALL(*mock_login_display_host_.get(), CreateLoginDisplay(_))
133 .Times(1)
134 .WillOnce(Return(mock_login_display_));
135 EXPECT_CALL(*mock_login_display_host_.get(), GetNativeWindow())
136 .Times(1)
137 .WillOnce(ReturnNull());
138 EXPECT_CALL(*mock_login_display_host_.get(), OnPreferencesChanged())
139 .Times(1);
140 EXPECT_CALL(*mock_login_display_, Init(_, false, true, true))
141 .Times(1);
144 void SetUpCommandLine(base::CommandLine* command_line) override {
145 command_line->AppendSwitch(switches::kLoginManager);
146 command_line->AppendSwitch(switches::kForceLoginManagerInTests);
149 void SetUpOnMainThread() override {
150 existing_user_controller_.reset(
151 new ExistingUserController(mock_login_display_host_.get()));
152 ASSERT_EQ(existing_user_controller(), existing_user_controller_.get());
153 existing_user_controller_->Init(user_manager::UserList());
155 chromeos::test::UserSessionManagerTestApi session_manager_test_api(
156 chromeos::UserSessionManager::GetInstance());
157 session_manager_test_api.SetShouldObtainTokenHandleInTests(false);
160 void TearDownOnMainThread() override {
161 DevicePolicyCrosBrowserTest::InProcessBrowserTest::TearDownOnMainThread();
163 // |existing_user_controller_| has data members that are CrosSettings
164 // observers. They need to be destructed before CrosSettings.
165 existing_user_controller_.reset();
167 // Test case may be configured with the real user manager but empty user
168 // list initially. So network OOBE screen is initialized.
169 // Need to reset it manually so that we don't end up with CrosSettings
170 // observer that wasn't removed.
171 WizardController* controller = WizardController::default_controller();
172 if (controller && controller->current_screen())
173 controller->current_screen()->Hide();
176 void ExpectLoginFailure() {
177 EXPECT_CALL(*mock_login_display_, SetUIEnabled(false))
178 .Times(1);
179 EXPECT_CALL(*mock_login_display_,
180 ShowError(IDS_LOGIN_ERROR_OWNER_KEY_LOST,
182 HelpAppLauncher::HELP_CANT_ACCESS_ACCOUNT))
183 .Times(1);
184 EXPECT_CALL(*mock_login_display_, SetUIEnabled(true))
185 .Times(1);
188 void RegisterUser(const std::string& user_id) {
189 ListPrefUpdate users_pref(g_browser_process->local_state(),
190 "LoggedInUsers");
191 users_pref->AppendIfNotPresent(new base::StringValue(user_id));
194 // ExistingUserController private member accessors.
195 base::OneShotTimer<ExistingUserController>* auto_login_timer() {
196 return existing_user_controller()->auto_login_timer_.get();
199 const std::string& auto_login_username() const {
200 return existing_user_controller()->public_session_auto_login_username_;
203 int auto_login_delay() const {
204 return existing_user_controller()->public_session_auto_login_delay_;
207 bool is_login_in_progress() const {
208 return existing_user_controller()->is_login_in_progress_;
211 scoped_ptr<ExistingUserController> existing_user_controller_;
213 // |mock_login_display_| is owned by the ExistingUserController, which calls
214 // CreateLoginDisplay() on the |mock_login_display_host_| to get it.
215 MockLoginDisplay* mock_login_display_;
216 scoped_ptr<MockLoginDisplayHost> mock_login_display_host_;
218 // Mock URLFetcher.
219 MockURLFetcherFactory<SuccessFetcher> factory_;
221 private:
222 DISALLOW_COPY_AND_ASSIGN(ExistingUserControllerTest);
225 IN_PROC_BROWSER_TEST_F(ExistingUserControllerTest, PRE_ExistingUserLogin) {
226 RegisterUser(kUsername);
229 IN_PROC_BROWSER_TEST_F(ExistingUserControllerTest, ExistingUserLogin) {
230 EXPECT_CALL(*mock_login_display_, SetUIEnabled(false))
231 .Times(2);
232 UserContext user_context(kUsername);
233 user_context.SetGaiaID(kGaiaID);
234 user_context.SetKey(Key(kPassword));
235 user_context.SetUserIDHash(kUsername);
236 test::UserSessionManagerTestApi session_manager_test_api(
237 UserSessionManager::GetInstance());
238 session_manager_test_api.InjectStubUserContext(user_context);
239 EXPECT_CALL(*mock_login_display_, SetUIEnabled(true))
240 .Times(1);
241 EXPECT_CALL(*mock_login_display_host_,
242 StartWizard(WizardController::kTermsOfServiceScreenName))
243 .Times(0);
245 content::WindowedNotificationObserver profile_prepared_observer(
246 chrome::NOTIFICATION_LOGIN_USER_PROFILE_PREPARED,
247 content::NotificationService::AllSources());
248 existing_user_controller()->Login(user_context, SigninSpecifics());
250 profile_prepared_observer.Wait();
251 content::RunAllPendingInMessageLoop();
254 // Verifies that when the cros settings are untrusted, no new session can be
255 // started.
256 class ExistingUserControllerUntrustedTest : public ExistingUserControllerTest {
257 public:
258 ExistingUserControllerUntrustedTest();
260 void SetUpInProcessBrowserTestFixture() override;
262 void SetUpSessionManager() override;
264 private:
265 DISALLOW_COPY_AND_ASSIGN(ExistingUserControllerUntrustedTest);
268 ExistingUserControllerUntrustedTest::ExistingUserControllerUntrustedTest() {
271 void ExistingUserControllerUntrustedTest::SetUpInProcessBrowserTestFixture() {
272 ExistingUserControllerTest::SetUpInProcessBrowserTestFixture();
274 ExpectLoginFailure();
277 void ExistingUserControllerUntrustedTest::SetUpSessionManager() {
278 InstallOwnerKey();
281 IN_PROC_BROWSER_TEST_F(ExistingUserControllerUntrustedTest,
282 ExistingUserLoginForbidden) {
283 UserContext user_context(kUsername);
284 user_context.SetGaiaID(kGaiaID);
285 user_context.SetKey(Key(kPassword));
286 user_context.SetUserIDHash(kUsername);
287 existing_user_controller()->Login(user_context, SigninSpecifics());
290 IN_PROC_BROWSER_TEST_F(ExistingUserControllerUntrustedTest,
291 NewUserLoginForbidden) {
292 UserContext user_context(kUsername);
293 user_context.SetGaiaID(kGaiaID);
294 user_context.SetKey(Key(kPassword));
295 user_context.SetUserIDHash(kUsername);
296 existing_user_controller()->CompleteLogin(user_context);
299 IN_PROC_BROWSER_TEST_F(ExistingUserControllerUntrustedTest,
300 CreateAccountForbidden) {
301 existing_user_controller()->CreateAccount();
304 IN_PROC_BROWSER_TEST_F(ExistingUserControllerUntrustedTest,
305 GuestLoginForbidden) {
306 existing_user_controller()->Login(
307 UserContext(user_manager::USER_TYPE_GUEST, std::string()),
308 SigninSpecifics());
311 IN_PROC_BROWSER_TEST_F(ExistingUserControllerUntrustedTest,
312 SupervisedUserLoginForbidden) {
313 UserContext user_context(kSupervisedUserID);
314 user_context.SetKey(Key(kPassword));
315 user_context.SetUserIDHash(kUsername);
316 existing_user_controller()->Login(user_context, SigninSpecifics());
319 IN_PROC_BROWSER_TEST_F(ExistingUserControllerUntrustedTest,
320 SupervisedUserCreationForbidden) {
321 MockBaseScreenDelegate mock_base_screen_delegate;
322 SupervisedUserCreationScreenHandler supervised_user_creation_screen_handler;
323 SupervisedUserCreationScreen supervised_user_creation_screen(
324 &mock_base_screen_delegate, &supervised_user_creation_screen_handler);
326 supervised_user_creation_screen.AuthenticateManager(kUsername, kPassword);
329 MATCHER_P(HasDetails, expected, "") {
330 return expected == *content::Details<const std::string>(arg).ptr();
333 class ExistingUserControllerPublicSessionTest
334 : public ExistingUserControllerTest {
335 protected:
336 ExistingUserControllerPublicSessionTest()
337 : public_session_user_id_(policy::GenerateDeviceLocalAccountUserId(
338 kPublicSessionAccountId,
339 policy::DeviceLocalAccount::TYPE_PUBLIC_SESSION)) {
342 void SetUpOnMainThread() override {
343 ExistingUserControllerTest::SetUpOnMainThread();
345 // Wait for the public session user to be created.
346 if (!user_manager::UserManager::Get()->IsKnownUser(
347 public_session_user_id_)) {
348 content::WindowedNotificationObserver(
349 chrome::NOTIFICATION_USER_LIST_CHANGED,
350 base::Bind(&user_manager::UserManager::IsKnownUser,
351 base::Unretained(user_manager::UserManager::Get()),
352 public_session_user_id_)).Wait();
355 // Wait for the device local account policy to be installed.
356 policy::CloudPolicyStore* store =
357 TestingBrowserProcess::GetGlobal()
358 ->platform_part()
359 ->browser_policy_connector_chromeos()
360 ->GetDeviceLocalAccountPolicyService()
361 ->GetBrokerForUser(public_session_user_id_)
362 ->core()
363 ->store();
364 if (!store->has_policy()) {
365 policy::MockCloudPolicyStoreObserver observer;
367 base::RunLoop loop;
368 store->AddObserver(&observer);
369 EXPECT_CALL(observer, OnStoreLoaded(store))
370 .Times(1)
371 .WillOnce(InvokeWithoutArgs(&loop, &base::RunLoop::Quit));
372 loop.Run();
373 store->RemoveObserver(&observer);
377 void SetUpSessionManager() override {
378 InstallOwnerKey();
380 // Setup the device policy.
381 em::ChromeDeviceSettingsProto& proto(device_policy()->payload());
382 em::DeviceLocalAccountInfoProto* account =
383 proto.mutable_device_local_accounts()->add_account();
384 account->set_account_id(kPublicSessionAccountId);
385 account->set_type(
386 em::DeviceLocalAccountInfoProto::ACCOUNT_TYPE_PUBLIC_SESSION);
387 RefreshDevicePolicy();
389 // Setup the device local account policy.
390 policy::UserPolicyBuilder device_local_account_policy;
391 device_local_account_policy.policy_data().set_username(
392 kPublicSessionAccountId);
393 device_local_account_policy.policy_data().set_policy_type(
394 policy::dm_protocol::kChromePublicAccountPolicyType);
395 device_local_account_policy.policy_data().set_settings_entity_id(
396 kPublicSessionAccountId);
397 device_local_account_policy.Build();
398 session_manager_client()->set_device_local_account_policy(
399 kPublicSessionAccountId,
400 device_local_account_policy.GetBlob());
403 void SetUpLoginDisplay() override {
404 EXPECT_CALL(*mock_login_display_host_.get(), CreateLoginDisplay(_))
405 .Times(1)
406 .WillOnce(Return(mock_login_display_));
407 EXPECT_CALL(*mock_login_display_host_.get(), GetNativeWindow())
408 .Times(AnyNumber())
409 .WillRepeatedly(ReturnNull());
410 EXPECT_CALL(*mock_login_display_host_.get(), OnPreferencesChanged())
411 .Times(AnyNumber());
412 EXPECT_CALL(*mock_login_display_, Init(_, _, _, _))
413 .Times(AnyNumber());
416 void TearDownOnMainThread() override {
417 ExistingUserControllerTest::TearDownOnMainThread();
419 // Test case may be configured with the real user manager but empty user
420 // list initially. So network OOBE screen is initialized.
421 // Need to reset it manually so that we don't end up with CrosSettings
422 // observer that wasn't removed.
423 WizardController* controller = WizardController::default_controller();
424 if (controller && controller->current_screen())
425 controller->current_screen()->Hide();
428 void ExpectSuccessfulLogin(const UserContext& user_context) {
429 test::UserSessionManagerTestApi session_manager_test_api(
430 UserSessionManager::GetInstance());
431 session_manager_test_api.InjectStubUserContext(user_context);
432 EXPECT_CALL(*mock_login_display_host_,
433 StartWizard(WizardController::kTermsOfServiceScreenName))
434 .Times(0);
435 EXPECT_CALL(*mock_login_display_, SetUIEnabled(false)).Times(AnyNumber());
436 EXPECT_CALL(*mock_login_display_, SetUIEnabled(true)).Times(AnyNumber());
439 void SetAutoLoginPolicy(const std::string& username, int delay) {
440 // Wait until ExistingUserController has finished auto-login
441 // configuration by observing the same settings that trigger
442 // ConfigurePublicSessionAutoLogin.
444 em::ChromeDeviceSettingsProto& proto(device_policy()->payload());
446 // If both settings have changed we need to wait for both to
447 // propagate, so check the new values against the old ones.
448 scoped_refptr<content::MessageLoopRunner> runner1;
449 scoped_ptr<CrosSettings::ObserverSubscription> subscription1;
450 if (!proto.has_device_local_accounts() ||
451 !proto.device_local_accounts().has_auto_login_id() ||
452 proto.device_local_accounts().auto_login_id() != username) {
453 runner1 = new content::MessageLoopRunner;
454 subscription1 = chromeos::CrosSettings::Get()->AddSettingsObserver(
455 chromeos::kAccountsPrefDeviceLocalAccountAutoLoginId,
456 runner1->QuitClosure());
458 scoped_refptr<content::MessageLoopRunner> runner2;
459 scoped_ptr<CrosSettings::ObserverSubscription> subscription2;
460 if (!proto.has_device_local_accounts() ||
461 !proto.device_local_accounts().has_auto_login_delay() ||
462 proto.device_local_accounts().auto_login_delay() != delay) {
463 runner1 = new content::MessageLoopRunner;
464 subscription1 = chromeos::CrosSettings::Get()->AddSettingsObserver(
465 chromeos::kAccountsPrefDeviceLocalAccountAutoLoginDelay,
466 runner1->QuitClosure());
469 // Update the policy.
470 proto.mutable_device_local_accounts()->set_auto_login_id(username);
471 proto.mutable_device_local_accounts()->set_auto_login_delay(delay);
472 RefreshDevicePolicy();
474 // Wait for ExistingUserController to read the updated settings.
475 if (runner1.get())
476 runner1->Run();
477 if (runner2.get())
478 runner2->Run();
481 void ConfigureAutoLogin() {
482 existing_user_controller()->ConfigurePublicSessionAutoLogin();
485 void FireAutoLogin() {
486 existing_user_controller()->OnPublicSessionAutoLoginTimerFire();
489 void MakeCrosSettingsPermanentlyUntrusted() {
490 device_policy()->policy().set_policy_data_signature("bad signature");
491 session_manager_client()->set_device_policy(device_policy()->GetBlob());
492 session_manager_client()->OnPropertyChangeComplete(true);
494 base::RunLoop run_loop;
495 WaitForPermanentlyUntrustedStatusAndRun(run_loop.QuitClosure());
496 run_loop.Run();
499 const std::string public_session_user_id_;
501 private:
502 DISALLOW_COPY_AND_ASSIGN(ExistingUserControllerPublicSessionTest);
505 IN_PROC_BROWSER_TEST_F(ExistingUserControllerPublicSessionTest,
506 ConfigureAutoLoginUsingPolicy) {
507 existing_user_controller()->OnSigninScreenReady();
508 EXPECT_EQ("", auto_login_username());
509 EXPECT_EQ(0, auto_login_delay());
510 EXPECT_FALSE(auto_login_timer());
512 // Set the policy.
513 SetAutoLoginPolicy(kPublicSessionAccountId, kAutoLoginLongDelay);
514 EXPECT_EQ(public_session_user_id_, auto_login_username());
515 EXPECT_EQ(kAutoLoginLongDelay, auto_login_delay());
516 ASSERT_TRUE(auto_login_timer());
517 EXPECT_TRUE(auto_login_timer()->IsRunning());
519 // Unset the policy.
520 SetAutoLoginPolicy("", 0);
521 EXPECT_EQ("", auto_login_username());
522 EXPECT_EQ(0, auto_login_delay());
523 ASSERT_TRUE(auto_login_timer());
524 EXPECT_FALSE(auto_login_timer()->IsRunning());
527 IN_PROC_BROWSER_TEST_F(ExistingUserControllerPublicSessionTest,
528 AutoLoginNoDelay) {
529 // Set up mocks to check login success.
530 UserContext user_context(user_manager::USER_TYPE_PUBLIC_ACCOUNT,
531 public_session_user_id_);
532 user_context.SetUserIDHash(user_context.GetUserID());
533 ExpectSuccessfulLogin(user_context);
534 existing_user_controller()->OnSigninScreenReady();
536 // Start auto-login and wait for login tasks to complete.
537 SetAutoLoginPolicy(kPublicSessionAccountId, kAutoLoginNoDelay);
538 content::RunAllPendingInMessageLoop();
541 IN_PROC_BROWSER_TEST_F(ExistingUserControllerPublicSessionTest,
542 AutoLoginShortDelay) {
543 // Set up mocks to check login success.
544 UserContext user_context(user_manager::USER_TYPE_PUBLIC_ACCOUNT,
545 public_session_user_id_);
546 user_context.SetUserIDHash(user_context.GetUserID());
547 ExpectSuccessfulLogin(user_context);
548 existing_user_controller()->OnSigninScreenReady();
550 content::WindowedNotificationObserver profile_prepared_observer(
551 chrome::NOTIFICATION_LOGIN_USER_PROFILE_PREPARED,
552 content::NotificationService::AllSources());
554 SetAutoLoginPolicy(kPublicSessionAccountId, kAutoLoginShortDelay);
555 ASSERT_TRUE(auto_login_timer());
556 // Don't assert that timer is running: with the short delay sometimes
557 // the trigger happens before the assert. We've already tested that
558 // the timer starts when it should.
560 // Wait for the timer to fire.
561 base::RunLoop runner;
562 base::OneShotTimer<base::RunLoop> timer;
563 timer.Start(FROM_HERE,
564 base::TimeDelta::FromMilliseconds(kAutoLoginShortDelay + 1),
565 runner.QuitClosure());
566 runner.Run();
568 profile_prepared_observer.Wait();
570 // Wait for login tasks to complete.
571 content::RunAllPendingInMessageLoop();
574 IN_PROC_BROWSER_TEST_F(ExistingUserControllerPublicSessionTest,
575 LoginStopsAutoLogin) {
576 // Set up mocks to check login success.
577 UserContext user_context(kUsername);
578 user_context.SetGaiaID(kGaiaID);
579 user_context.SetKey(Key(kPassword));
580 user_context.SetUserIDHash(user_context.GetUserID());
581 ExpectSuccessfulLogin(user_context);
583 existing_user_controller()->OnSigninScreenReady();
584 SetAutoLoginPolicy(kPublicSessionAccountId, kAutoLoginLongDelay);
585 EXPECT_TRUE(auto_login_timer());
587 content::WindowedNotificationObserver profile_prepared_observer(
588 chrome::NOTIFICATION_LOGIN_USER_PROFILE_PREPARED,
589 content::NotificationService::AllSources());
591 // Log in and check that it stopped the timer.
592 existing_user_controller()->Login(user_context, SigninSpecifics());
593 EXPECT_TRUE(is_login_in_progress());
594 ASSERT_TRUE(auto_login_timer());
595 EXPECT_FALSE(auto_login_timer()->IsRunning());
597 profile_prepared_observer.Wait();
599 // Wait for login tasks to complete.
600 content::RunAllPendingInMessageLoop();
602 // Timer should still be stopped after login completes.
603 ASSERT_TRUE(auto_login_timer());
604 EXPECT_FALSE(auto_login_timer()->IsRunning());
607 IN_PROC_BROWSER_TEST_F(ExistingUserControllerPublicSessionTest,
608 GuestModeLoginStopsAutoLogin) {
609 EXPECT_CALL(*mock_login_display_, SetUIEnabled(false))
610 .Times(2);
611 UserContext user_context(kUsername);
612 user_context.SetGaiaID(kGaiaID);
613 user_context.SetKey(Key(kPassword));
614 test::UserSessionManagerTestApi session_manager_test_api(
615 UserSessionManager::GetInstance());
616 session_manager_test_api.InjectStubUserContext(user_context);
618 existing_user_controller()->OnSigninScreenReady();
619 SetAutoLoginPolicy(kPublicSessionAccountId, kAutoLoginLongDelay);
620 EXPECT_TRUE(auto_login_timer());
622 // Login and check that it stopped the timer.
623 existing_user_controller()->Login(UserContext(user_manager::USER_TYPE_GUEST,
624 std::string()),
625 SigninSpecifics());
626 EXPECT_TRUE(is_login_in_progress());
627 ASSERT_TRUE(auto_login_timer());
628 EXPECT_FALSE(auto_login_timer()->IsRunning());
630 // Wait for login tasks to complete.
631 content::RunAllPendingInMessageLoop();
633 // Timer should still be stopped after login completes.
634 ASSERT_TRUE(auto_login_timer());
635 EXPECT_FALSE(auto_login_timer()->IsRunning());
638 IN_PROC_BROWSER_TEST_F(ExistingUserControllerPublicSessionTest,
639 CompleteLoginStopsAutoLogin) {
640 // Set up mocks to check login success.
641 UserContext user_context(kUsername);
642 user_context.SetGaiaID(kGaiaID);
643 user_context.SetKey(Key(kPassword));
644 user_context.SetUserIDHash(user_context.GetUserID());
645 ExpectSuccessfulLogin(user_context);
646 EXPECT_CALL(*mock_login_display_host_, OnCompleteLogin())
647 .Times(1);
649 existing_user_controller()->OnSigninScreenReady();
650 SetAutoLoginPolicy(kPublicSessionAccountId, kAutoLoginLongDelay);
651 EXPECT_TRUE(auto_login_timer());
653 content::WindowedNotificationObserver profile_prepared_observer(
654 chrome::NOTIFICATION_LOGIN_USER_PROFILE_PREPARED,
655 content::NotificationService::AllSources());
657 // Check that login completes and stops the timer.
658 existing_user_controller()->CompleteLogin(user_context);
659 ASSERT_TRUE(auto_login_timer());
660 EXPECT_FALSE(auto_login_timer()->IsRunning());
662 profile_prepared_observer.Wait();
664 // Wait for login tasks to complete.
665 content::RunAllPendingInMessageLoop();
667 // Timer should still be stopped after login completes.
668 ASSERT_TRUE(auto_login_timer());
669 EXPECT_FALSE(auto_login_timer()->IsRunning());
672 IN_PROC_BROWSER_TEST_F(ExistingUserControllerPublicSessionTest,
673 PublicSessionLoginStopsAutoLogin) {
674 // Set up mocks to check login success.
675 UserContext user_context(user_manager::USER_TYPE_PUBLIC_ACCOUNT,
676 public_session_user_id_);
677 user_context.SetUserIDHash(user_context.GetUserID());
678 ExpectSuccessfulLogin(user_context);
679 existing_user_controller()->OnSigninScreenReady();
680 SetAutoLoginPolicy(kPublicSessionAccountId, kAutoLoginLongDelay);
681 EXPECT_TRUE(auto_login_timer());
683 content::WindowedNotificationObserver profile_prepared_observer(
684 chrome::NOTIFICATION_LOGIN_USER_PROFILE_PREPARED,
685 content::NotificationService::AllSources());
687 // Login and check that it stopped the timer.
688 existing_user_controller()->Login(
689 UserContext(user_manager::USER_TYPE_PUBLIC_ACCOUNT,
690 public_session_user_id_),
691 SigninSpecifics());
693 EXPECT_TRUE(is_login_in_progress());
694 ASSERT_TRUE(auto_login_timer());
695 EXPECT_FALSE(auto_login_timer()->IsRunning());
697 profile_prepared_observer.Wait();
699 // Wait for login tasks to complete.
700 content::RunAllPendingInMessageLoop();
702 // Timer should still be stopped after login completes.
703 ASSERT_TRUE(auto_login_timer());
704 EXPECT_FALSE(auto_login_timer()->IsRunning());
707 IN_PROC_BROWSER_TEST_F(ExistingUserControllerPublicSessionTest,
708 LoginForbiddenWhenUntrusted) {
709 // Make cros settings untrusted.
710 MakeCrosSettingsPermanentlyUntrusted();
712 // Check that the attempt to start a public session fails with an error.
713 ExpectLoginFailure();
714 UserContext user_context(kUsername);
715 user_context.SetGaiaID(kGaiaID);
716 user_context.SetKey(Key(kPassword));
717 user_context.SetUserIDHash(user_context.GetUserID());
718 existing_user_controller()->Login(user_context, SigninSpecifics());
721 IN_PROC_BROWSER_TEST_F(ExistingUserControllerPublicSessionTest,
722 NoAutoLoginWhenUntrusted) {
723 // Start the public session timer.
724 SetAutoLoginPolicy(kPublicSessionAccountId, kAutoLoginLongDelay);
725 existing_user_controller()->OnSigninScreenReady();
726 EXPECT_TRUE(auto_login_timer());
728 // Make cros settings untrusted.
729 MakeCrosSettingsPermanentlyUntrusted();
731 // Check that when the timer fires, auto-login fails with an error.
732 ExpectLoginFailure();
733 FireAutoLogin();
736 IN_PROC_BROWSER_TEST_F(ExistingUserControllerPublicSessionTest,
737 PRE_TestLoadingPublicUsersFromLocalState) {
738 // First run propagates public accounts and stores them in Local State.
741 // See http://crbug.com/393704; flaky.
742 IN_PROC_BROWSER_TEST_F(ExistingUserControllerPublicSessionTest,
743 DISABLED_TestLoadingPublicUsersFromLocalState) {
744 // Second run loads list of public accounts from Local State.
747 } // namespace chromeos